Description
A vulnerability has been found in eiliyaabedini aider-mcp up to 667b914301aada695aab0e46d1fb3a7d5e32c8af. Affected is an unknown function of the file aider_mcp.py of the component code_with_ai. The manipulation of the argument working_dir/editable_files leads to command injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. This product uses a rolling release model to deliver continuous updates. As a result, specific version information for affected or updated releases is not available. The project was informed of the problem early through an issue report but has not responded yet.
Published: 2026-04-28
Score: 6.9 Medium
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The flaw resides in aider_mcp.py, where an attacker can manipulate the working_dir/editable_files argument to inject arbitrary shell commands. If successfully exploited, the attacker gains full control over the host, compromising confidentiality, integrity, and availability. The weakness is reflected in CWE-74 and CWE-77, indicating improper input handling and command execution without sanitization.

Affected Systems

Vendors and products affected are eiliyaabedini’s aider-mcp, specifically the code_with_ai component. The vulnerability exists in all builds up to the commit 667b914301aada695aab0e46d1fb3a7d5e32c8af; because the project follows a rolling release model, precise version numbers for the patched release are not yet published.

Risk and Exploitability

The CVSS score of 6.9 marks this as a medium‑severity issue. The EPSS score is not available, and the vulnerability is not listed in the CISA KEV catalog. Despite the uncertainty about exploitation probability, the attack vector is likely remote, as the injection can be triggered by an external actor sending a crafted request. The publicly disclosed exploit suggests that the problem is both real and potentially actionable by malicious actors.

Generated by OpenCVE AI on April 29, 2026 at 02:13 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade to the latest revision of eiliyaabedini aider-mcp once the maintainer releases a fix.
  • Temporarily disable or remove the working_dir/editable_files argument usage until a patch is available, or modify the code to sanitize input before execution.
  • Implement network or application-level controls to restrict remote access to the vulnerable API endpoint, such as firewall rules or VPN constraints.

Generated by OpenCVE AI on April 29, 2026 at 02:13 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 29 Apr 2026 10:30:00 +0000

Type Values Removed Values Added
First Time appeared Eiliyaabedini
Eiliyaabedini aider-mcp
Vendors & Products Eiliyaabedini
Eiliyaabedini aider-mcp

Tue, 28 Apr 2026 22:15:00 +0000

Type Values Removed Values Added
Description A vulnerability has been found in eiliyaabedini aider-mcp up to 667b914301aada695aab0e46d1fb3a7d5e32c8af. Affected is an unknown function of the file aider_mcp.py of the component code_with_ai. The manipulation of the argument working_dir/editable_files leads to command injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. This product uses a rolling release model to deliver continuous updates. As a result, specific version information for affected or updated releases is not available. The project was informed of the problem early through an issue report but has not responded yet.
Title eiliyaabedini aider-mcp code_with_ai aider_mcp.py command injection
Weaknesses CWE-74
CWE-77
References
Metrics cvssV2_0

{'score': 7.5, 'vector': 'AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 7.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Eiliyaabedini Aider-mcp
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-04-28T20:15:16.304Z

Reserved: 2026-04-28T13:06:19.390Z

Link: CVE-2026-7316

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-04-28T22:16:51.543

Modified: 2026-04-29T01:00:01.613

Link: CVE-2026-7316

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-29T10:10:25Z

Weaknesses